-
521
ANALISA PERBANDINGAN KETELITIAN PENENTUAN POSISI DENGAN GPS RTK-NTRIP DENGAN BASE GPS CORS BIG DARI BERBAGAI MACAM MOBILE PROVIDER DIDASARKAN PADA PERGESERAN LINEAR (STUDI KASUS: S...
Published 2015-02-01“…Dalam perkembangan sekarang ini metode pengukuran RTK telah menggunakan metode NTRIP (Networked Transport of RTCM via Internet Protocol) sebagai metode transmisi koreksi data dengan menggunakan intenet sehingga pengukuran tersebut masih bisa dilakukan dengan jarak yang lebih jauh dari base-nya. …”
Get full text
Article -
522
Enhanced Multicast Repair Fast Reroute Mechanism for Smart Sensors IoT and Network Infrastructure
Published 2020-06-01“…The sprawling nature of Internet of Things (IoT) sensors require the comprehensive management and reliability of the entire network. Modern Internet Protocol (IP) networks demand specific qualitative and quantitative parameters that need to be met. …”
Get full text
Article -
523
Enhanced Multiple Speakers’ Separation and Identification for VOIP Applications Using Deep Learning
Published 2023-03-01“…They primarily utilise Voice over Internet Protocol (VoIP) software to perform online meetings. …”
Get full text
Article -
524
Optimal Distributed MQTT Broker and Services Placement for SDN-Edge Based Smart City Architecture
Published 2022-04-01“…The smart city IoT infrastructure connects numerous devices to an Internet-protocol-based low-power wireless network, shares massive amounts of data, and facilitates the development of new services. …”
Get full text
Article -
525
The RapidIO Routing Strategy Based on the Double-Antibody Group Multi-Objective Artificial Immunity Algorithm
Published 2022-01-01“…The RapidIO standard is a packet-switching interconnection technology similar to the Internet Protocol (IP) conceptually. It realizes the high-speed transmission of RapidIO packets at the transport layer, but this greatly increases the probability of network blocking. …”
Get full text
Article -
526
An improving performance cellular DTV broadcasting with hybrid non-orthogonal LDM and orthogonal eMBMS configuration
Published 2021-09-01“…The proposed hybrid can operate in conditions without a subscriber identity module (SIM) card for uplink beamforming and internet protocol (IP). The broadcast network provider selection is feasible by the user equipment (UE) device. …”
Get full text
Article -
527
Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated Networks
Published 2021-12-01“…Specifically, virtual Internet Protocol (IP) technology and the epoll model are effectively integrated in this investigation to resolve the contradiction between large-scale emulation and computational overhead. …”
Get full text
Article -
528
Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA
Published 2023-01-01“…The proposed model is utilized to articulate a proficient model for the design and execution of field programable gate array (FPGA)-based image enhancement processes along with the Sobel edge detection algorithm upon DR images. Finally, a Internet Protocol chip is developed that can combine multiple image enhancement operations into a single framework with less complexity.…”
Get full text
Article -
529
GPS Based Navigation and Mobile Base Station of a Mobile Robot Platform
Published 2023-12-01“…The Network Transport of Radio Technical Commission for Maritime Services (RTCM) via Internet Protocol (NTRIP) server facilitates the communication between the onboard unit and the base station via a 5G network. …”
Get full text
Article -
530
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Published 2024-02-01“…This iteration of the Internet protocol is superior, particularly in surveillance contexts, given its expansive address capacity (128 bits) juxtaposed against its antecedent, the IPv4 protocol (32 bits). …”
Get full text
Article -
531
NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network
Published 2020-09-01“…The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. …”
Get full text
Article -
532
Comparison of error reconciliation protocols in quantum key distribution
Published 2011“…In this project, three error reconciliation protocols: Cascade, the Cascade-Hash algorithm and Winnow were being compared via the statistical approach with the efficiency based on the error-corrected key rate and the number of bits transmitted across a practical channel using the Transmission Control Protocol/Internet Protocol (TCP/IP), taking into account the additional bits required to perform random shuffling and bit deletion. …”
Get full text
Final Year Project (FYP) -
533
Development of a framework for Network Intrusion Detection System (NIDS)
Published 2019“…By doing so, it allows the Network Intrusion Detection system to detect the attackers’ and victims’ Internet Protocol addresses, and the types of malicious activities which are conducted. …”
Get full text
Final Year Project (FYP) -
534
PEMBUATAN SISTEM PEMANTAUAN PERGERAKAN TITIK HASIL PENENTUAN POSISI METODE NTRIP RTK MENGUNAKAN KOMUNIKASI DATA BERBASIS TCP-IP
Published 2010“…Metode survei RTK (Real Time Kinematic) memanfaatkan layanan NTRIP (Networked Transport of RTCM via Internet Protocol) dari stasiun CORS (Continually Operating Reference Station) dapat dimanfaatkan untuk penentuan posisi dan pemantauan pergerakan titik yang terletak pada pada lokasi tertentu (disebut kemudian dengan rover station) dari sebuah stasiun kontrol yang terletak jauh dari titik yang dipantau (disebut kemudian dengan monitor station). …”
Get full text
Conference or Workshop Item -
535
Interactive multi-media applications: quality of service guaranteed under huge traffic
Published 2014“…Interactive Multimedia IMM applications such as Voice over Internet Protocol VOIP and video conferencing are being produced. …”
Get full text
Get full text
Article -
536
Named Data Networking: A Survey on Routing Strategies
Published 2022“…As data traffic increases exponentially, NDN offers three main advantages over current Transmission Control Protocol and Internet Protocol-based networks. These advantages are in-network caching, smooth mobility, and robust content dissemination. …”
Get full text
Get full text
Article -
537
The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN)
Published 2011“…Internet Protocol version 6 (IPv6) over Low-power Personal Area Network (6LoWPAN) is proposed by the Internet Engineering Task Force (IETF) working group to accomplish the concept of IP-based Wireless Sensor Network (WSN). …”
Get full text
Conference or Workshop Item -
538
Mutual remote attestation in IPSec based VPN
Published 2013“…Secure communication between computer systems is normally established using secure tunnel technologies such as Internet Protocol Security (IPSec). IPSec protocol guarantees authenticity of communication and secure the data at each gateway but it does not provide any assurance on the entity authentication. …”
Get full text
Article -
539
Prototype development of VOIP steganography
Published 2009“…One of the new and promising communication medium that can be used as a host for steganography is Voice over Internet Protocol. VoIP is a form of communication that allows people to make phone calls over an internet connection instead of typical analogue telephone lines. …”
Get full text
Thesis -
540
A hardware architecture of stateless open digest spam fingerprinting unit
Published 2010“…First to develop an inline Internet Protocol wrapper that is capable for processing packets for stateless content classification. …”
Thesis